Browse Definitions :

Browse Definitions by Alphabet

CLO - NET

  • cloud-native application - A cloud-native application is a program that is designed for a cloud computing architecture.
  • N+1 UPS - N+1, also called parallel redundancy, is a safeguard to ensure that an uninterruptible power supply (UPS)system is always available.
  • N_Port ID virtualization (NPIV) - N_Port ID virtualization (NPIV) is a Fibre Channel (FC) standard that makes it possible to create multiple virtual ports on a single physical node port (N_Port), with each virtual port appearing as a unique entity to the FC network.
  • NACK (NAK, negative acknowledgment, not acknowledged) - NACK, or NAK, an abbreviation for negative acknowledgment or not acknowledged, is a signal used by computers or other devices to indicate that data transmitted over a network was received with errors or was otherwise unreadable.
  • Nagios - Nagios is an open source monitoring system for computer systems.
  • named account - A named account is a company that is identified as a valuable prospect or customer and assigned to an individual marketing or sales representative for targeted efforts.
  • named entity - In data mining, a named entity is a phrase that clearly identifies one item from a set of other items that have similar attributes.
  • named entity recognition (NER) - Named entity recognition (NER) is a sub-task of information extraction (IE) that seeks out and categorizes specified entities in a body or bodies of texts.
  • NAND flash memory - NAND flash memory is a type of non-volatile storage technology that does not require power to retain data.
  • NAND flash wear-out - NAND flash wear-out is the breakdown of the oxide layer within the floating gate transistors of NAND flash memory.
  • NANDroid backup - NANDroid backups are typically created by Android device owners who have gained root access to their phone’s operating system in order to use aftermarket distributions of the Android OS.
  • nano - Nano is a prefix meaning "extremely small.
  • nanocrystal - A nanocrystal is a crystalline particle with at least one dimension measuring less than 1000 nanometers (nm), where 1 nm is defined as 1 thousand-millionth of a meter (10-9 m).
  • nanomachine (nanite) - A nanomachine, also called a nanite, is a mechanical or electromechanical device whose dimensions are measured in nanometers (millionths of a millimeter, or units of 10 -9 meter).
  • nanometer - A nanometer is a unit of spatial measurement that is 10-9 meter, or one billionth of a meter.
  • nanopaint - Nanopaint is a coating that can modify the properties of a surface or substance according to user-defined parameters.
  • nanosecond (ns or nsec) - (This definition follows U.
  • narrow AI (weak AI) - Narrow AI is an application of artificial intelligence technologies to enable a high-functioning system that replicates -- and perhaps surpasses -- human intelligence for a dedicated purpose.
  • narrowband IoT (NB-IoT) - Narrowband IoT (NB-IoT) is a wireless internet of things (IoT) protocol using low-power wide area network (LPWAN) technology.
  • NAS enclosure (network-attached storage enclosure) - NAS enclosures provide shared storage to all users connected to a network, and vary in models appropriate for home offices to enterprises.
  • NAS filer (network-attached storage filer) - NAS filers add scalable, expandable storage for file-serving purposes in data sharing, cloud applications, Internet and enterprise networks, in both Fibre Channel SANs and Ethernet LANs.
  • NAS gateway - NAS gateway is a NAS (network-attached storage) system in which the storage media are externally attached, typically over a Fibre Channel interface.
  • National Electrical Code (NEC) - National Electrical Code (NEC) is a set of regularly updated standards for the safe installation of electric wiring in the United States.
  • national identity card - A national identity card is a portable document, typically a plasticized card with digitally-embedded information, that someone is required or encouraged to carry as a means of confirming their identity.
  • national provider identifier (NPI) - A national provider identifier (NPI) is a unique ten-digit identification number required by HIPAA for covered healthcare providers in the United States.
  • National Security Agency (NSA) - The National Security Agency (NSA) is a federal government intelligence agency that is part of the United States Department of Defense and is managed under the authority of the director of national intelligence (DNI).
  • National Vulnerability Database (NVD) - NVD (National Vulnerability Database) is a product of the National Institute of Standards and Technology (NIST) Computer Security Division and is used by the U.
  • Nationwide Health Information Network (NHIN) - The Nationwide Health Information Network (NHIN) is a set of standards, services and policies that enable secure health information exchange (HIE) over the Internet.
  • native app - A native application is a software program that is developed for use on a particular platform or device.
  • native code - Native code is computer programming (code) that is compiled to run with a particular processor and its set of instructions.
  • natural disaster recovery - Natural disaster recovery is the process of recovering data and resuming business operations following a natural disaster.
  • natural language generation (NLG) - Natural language generation (NLG) is the use of artificial intelligence (AI) programming to produce written or spoken narratives from a data set.
  • natural language processing (NLP) - Natural language processing (NLP) is the ability of a computer program to understand human language as it is spoken and written -- referred to as natural language.
  • natural language query - A natural language query is input that consists solely of terms or phrases spoken normally or entered as they might be spoken, without any non-language characters, such as the plus symbol or the asterisk, and without any special format or alteration of syntax.
  • natural language understanding (NLU) - Natural language understanding (NLU) is a branch of artificial intelligence (AI) that uses computer software to understand input in the form of sentences using text or speech.
  • natural number - A natural number is a number that occurs commonly and obviously in nature.
  • natural user interface (NUI) - A natural user interface (NUI) is a system for human-computer interaction that the user operates through intuitive actions related to natural, everyday human behavior.
  • NBASE-T Ethernet - NBASE-T Ethernet is an IEEE standard and Ethernet-signaling technology that allows existing twisted-pair copper cabling to exceed the cable's specified limit of 1 Gbps for distances of up to 100 meters.
  • NBMA (non-broadcast multiple access) - Non-broadcast multiple access (NBMA) is one of four network types in the Open Shortest Path First (OSPF) communications protocol.
  • NCR (no country redirect) - An explanation of the NCR (no country redirect) search parameter.
  • NDIS (Network Driver Interface Specification) - NDIS (Network Driver Interface Specification) is a Windows specification for how communication protocol programs (such as TCP/IP) and network device driver should communicate with each other.
  • near-end crosstalk (NEXT) - Near-end crosstalk (NEXT) is an error condition that can occur when connectors are attached to twisted pair cabling.
  • near-field communication (NFC) - Near-field communication (NFC) is a short-range wireless connectivity technology that uses magnetic field induction to enable communication between devices when they're touched together or brought within a few centimeters of each other.
  • nearline storage - Nearline storage is the on-site storage of data on removable media.
  • nearshore outsourcing - Nearshore outsourcing is the practice of getting work done or services performed by people in neighboring countries rather than an organization's country.
  • needs assessment - A needs assessment is an exercise that identifies the difference between a current condition/state and the desired condition/state.
  • negative correlation - A negative correlation is a relationship between two variables such that as the value of one variable increases, the other decreases.
  • negative float (negative slack) - Negative float, also known as negative slack, is a common concept in project management that refers to the amount of time that must be saved to complete a project on time.
  • neighborhood electric vehicle (NEV) - A neighborhood electric vehicle (NEV) is a type of battery-electric vehicle that is capable of traveling at a maximum speed of 25 mph and which has a maximum loaded weight of 3,000 lbs.
  • Nessus - Nessus is an open-source network vulnerability scanner that uses the Common Vulnerabilities and Exposures architecture for easy cross-linking between compliant security tools.
  • Nest Labs - Nest Labs was a home automation specialist company that produced programmable Wi-Fi-enabled products that can be remotely controlled through a Web service or an associated smart home app.
  • nested - In general, something that is nested is fully contained within something else of the same kind.
  • nested VM (nested virtual machine) - A nested VM (nested virtual machine) is a virtual machine contained within another VM.
  • net neutrality - Net neutrality is the concept of an open, equal internet for everyone, regardless of content consumed or the device, application or platform used.
  • net price - The net price is the value at which a product or service is sold after all taxes and other costs are added and all discounts subtracted.
  • Net Promoter Score (NPS) - Net Promoter Score (NPS) is a metric for assessing customer loyalty for a company's brand, products or services.
  • NetApp - NetApp, formerly Network Appliance Inc.
  • NetApp Data Fabric - The products and services that compose NetApp’s Data Fabric are designed to provide customers with the agility they need to quickly and efficiently move data to and from the cloud.
  • NetApp SolidFire - NetApp SolidFire is a business division of NetApp Inc.
  • NetBeans - NetBeans is a Java-based integrated development environment (IDE).
  • NetBIOS (Network Basic Input/Output System) - NetBIOS (Network Basic Input/Output System) is a network service that enables applications on different computers to communicate with each other across a local area network (LAN).
  • NETCONF - NETCONF is an IETF network management protocol that provides an administrator or network engineer with a secure way to configure a firewall, router, switch or other network device.
  • NetFlow - NetFlow is a network protocol developed by Cisco for the collection and monitoring of network traffic flow data that is generated by most Cisco routers and switches.
  • netizen - The word netizen seems to have two similar meanings.
  • Netscape - Netscape Communications was a computer services company best known for its Web browser, Navigator.
  • NetSuite - NetSuite is a business technology vendor based in San Mateo, California.
  • network access control (NAC) - Network access control (NAC), also called network admission control, is a method to bolster the security, visibility and access management of a proprietary network.
  • Network Address Translation (NAT) - A Network Address Translation (NAT) is the process of mapping an internet protocol (IP) address to another by changing the header of IP packets while in transit via a router.
  • network analytics - Network analytics is the application of big data principles and tools to the data used to manage and secure data networks.
  • network analyzer (protocol analyzer or packet analyzer) - A network analyzer -- also called a network protocol analyzer or packet analyzer -- is a software application, dedicated appliance or feature set within a network component used in network performance troubleshooting or to enhance protection against malicious activity within a corporate network.
  • Network as a Service (NaaS) - Network as a service (NaaS) is a business model for delivering enterprise-wide area network services virtually on a subscription basis.
  • network automation - Network automation is a methodology in which software automatically configures, provisions, manages and tests network devices.
  • network configuration management (NCM) - Network configuration management is the process of organizing and maintaining information about all of the components in a computer network.
  • network convergence - Network convergence is the efficient coexistence of telephone, video and data communication within a single network.
  • Network Data Management Protocol (NDMP) - Network Data Management Protocol (NDMP) is an open protocol to control data backup and recovery communications between primary and secondary storage in a heterogeneous network environment.
  • network disaster recovery plan - A network disaster recovery plan is a set of procedures designed to prepare an organization to respond to an interruption of network services during a natural or manmade catastrophe.
  • network downtime - Network downtime refers to inaccessibility to part or all of a network due to the failure of hardware, software or some combination of the two.
  • network drive - A network drive is a storage device on a local access network (LAN) within a business or home.
  • network engineer - A network engineer is a technology professional who has the necessary skills to plan, implement and oversee the computer networks that support in-house voice, data, video and wireless network services.
  • network fabric - Network fabric is an industry term that describes a network topology in which devices pass data to each other through interconnecting switches.
  • Network File System (NFS) - Network File System (NFS) is a networking protocol for distributed file sharing.
  • network functions virtualization (NFV) - Network functions virtualization (NFV) is a network architecture model designed to virtualize network services that have traditionally run on proprietary, dedicated network appliances.
  • network hub - A network hub is a node that broadcasts data to every computer or Ethernet-based device connected to it.
  • network interface card (NIC) - A network interface card (NIC) is a hardware component, typically a circuit board or chip, which is installed on a computer so it can connect to a network.
  • network intrusion protection system (NIPS) - A network intrusion protection system (NIPS) is an umbrella term for a combination of hardware and software systems that protect computer networks from unauthorized access and malicious activity.
  • Network layer - Located at Layer 3 of the Open Systems Interconnection (OSI) communications model, the primary function of the network layer is to move data into and through other networks.
  • Network Load Balancing (NLB) - Network Load Balancing is a Windows Server feature that can distribute network traffic among multiple servers.
  • network management - A cornerstone of all computing is the ability to connect one machine, system or device to another -- enabling what is known as a computer network.
  • network management system - A network management system (NMS) is an application or set of applications that lets network engineers manage a network's independent components inside a bigger network management framework and performs several key functions.
  • network monitoring - Network monitoring, also frequently called network management, is the practice of consistently overseeing a computer network for any failures or deficiencies to ensure continued network performance.
  • network node - A computer network is a system of computers and computing devices that are connected via communication links.
  • Network Node Manager i (NNMi) - The Network Node Manager i (NNMi) is a program that helps a network administrator view and manage the conditions in a computer network.
  • network operating system (NOS) - A network operating system (NOS) is a computer operating system (OS) that is designed primarily to support workstations, personal computers and, in some instances, older terminals that are connected on a local area network (LAN).
  • network operations center (NOC) - A network operations center (NOC) is a centralized place from which enterprise information technology (IT) administrators -- either internal or third party -- supervise, monitor and maintain a telecommunications network.
  • network packet - A network packet is a basic unit of data that's grouped together and transferred over a computer network, typically a packet-switched network, such as the internet.
  • network performance monitoring - Network performance monitoring is a process of measuring and monitoring the quality of service of a network to understand if it is properly operating.
  • network protocol - A network protocol is a set of established rules that dictate how to format, transmit and receive data so that computer network devices -- from servers and routers to endpoints -- can communicate, regardless of the differences in their underlying infrastructures, designs or standards.
  • network scanning - Network scanning is a procedure for identifying active devices on a network by employing a feature or features in the network protocol to signal devices and await a response.
  • network security - Network security encompasses all the steps taken to protect the integrity of a computer network and the data within it.
  • network segmentation - Network segmentation is a networking architectural design that divides a network into multiple segments (subnets) with each functioning as a smaller, individual network.
Networking
  • network traffic

    Network traffic is the amount of data that moves across a network during any given time.

  • dynamic and static

    In general, dynamic means 'energetic, capable of action and/or change, or forceful,' while static means 'stationary or fixed.'

  • MAC address (media access control address)

    A MAC address (media access control address) is a 12-digit hexadecimal number assigned to each device connected to the network.

Security
  • Evil Corp

    Evil Corp is an international cybercrime network that uses malicious software to steal money from victims' bank accounts and to ...

  • Trojan horse

    In computing, a Trojan horse is a program downloaded and installed on a computer that appears harmless, but is, in fact, ...

  • quantum key distribution (QKD)

    Quantum key distribution (QKD) is a secure communication method for exchanging encryption keys only known between shared parties.

CIO
  • benchmark

    A benchmark is a standard or point of reference people can use to measure something else.

  • spatial computing

    Spatial computing broadly characterizes the processes and tools used to capture, process and interact with 3D data.

  • organizational goals

    Organizational goals are strategic objectives that a company's management establishes to outline expected outcomes and guide ...

HRSoftware
  • talent acquisition

    Talent acquisition is the strategic process employers use to analyze their long-term talent needs in the context of business ...

  • employee retention

    Employee retention is the organizational goal of keeping productive and talented workers and reducing turnover by fostering a ...

  • hybrid work model

    A hybrid work model is a workforce structure that includes employees who work remotely and those who work on site, in a company's...

Customer Experience
  • database marketing

    Database marketing is a systematic approach to the gathering, consolidation and processing of consumer data.

  • cost per engagement (CPE)

    Cost per engagement (CPE) is an advertising pricing model in which digital marketing teams and advertisers only pay for ads when ...

  • B2C (Business2Consumer or Business-to-Consumer)

    B2C -- short for business-to-consumer -- is a retail model where products move directly from a business to the end user who has ...

Close